咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1 篇 工学
    • 1 篇 电气工程
    • 1 篇 计算机科学与技术...

主题

  • 3 篇 secure hash algo...
  • 2 篇 cryptography
  • 1 篇 caesar
  • 1 篇 advanced encrypt...
  • 1 篇 area reduction
  • 1 篇 cryptosat
  • 1 篇 software tools
  • 1 篇 automated tools
  • 1 篇 automated analys...
  • 1 篇 sat-based analys...
  • 1 篇 public scrutiny
  • 1 篇 structure simila...
  • 1 篇 public domain so...
  • 1 篇 blockchain
  • 1 篇 sat solvers
  • 1 篇 sat-based crypta...
  • 1 篇 public domain
  • 1 篇 fpga
  • 1 篇 digital signatur...
  • 1 篇 competitions

机构

  • 1 篇 department of co...
  • 1 篇 p g scholar gove...
  • 1 篇 royal mil acad d...
  • 1 篇 assistant profes...

作者

  • 1 篇 s. shireen siddi...
  • 1 篇 nithin r. chandr...
  • 1 篇 lafitte frederic
  • 1 篇 n. sabiyath fati...
  • 1 篇 ebin m. manuel

语言

  • 3 篇 英文
检索条件"主题词=Secure Hash Algorithm-3"
3 条 记 录,以下是1-10 订阅
排序:
CryptoSAT: a tool for SAT-based cryptanalysis
收藏 引用
IET INFORMATION SECURITY 2018年 第6期12卷 463-474页
作者: Lafitte, Frederic Royal Mil Acad Dept Math Brussels Belgium
The security of symmetric key primitives comes from their exposure to public scrutiny in the context of competitions such as Advanced Encryption Standard, secure hash algorithm 3, or currently CAESAR. However, due to ... 详细信息
来源: 评论
Digital File Rights Management System Using Blockchain
收藏 引用
Procedia Computer Science 2022年 215卷 309-320页
作者: S. Shireen Siddique N. Sabiyath Fatima Department of Computer Science and Engineering B.S. Abdur Rahman Crescent Institute of Science and Technology Chennai 600048 India
Creating digital content and distributing them has become much easier and convenient nowadays, where the digital content creator can create the content and also distribute their work to others from anywhere with the h... 详细信息
来源: 评论
Performance Analysis of Modified SHA-3
收藏 引用
Procedia Technology 2016年 24卷 904-910页
作者: Nithin R. Chandran Ebin M. Manuel P G Scholar Government Engineering College Idukki India Assistant Professor Government Engineering College Idukki India
Security services have become an inseparable feature of almost all digital transactions. A crucial module of these scheme isintegrity, which is performed using a cryptographic hash function. secure hash algorithm can ... 详细信息
来源: 评论